MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Digital Security Awareness

Course Summary

Learn to protect yourself against security breaches, vulnerabilities and guard your valuable data.


  • +

    Course Syllabus

    • Course Overview
      • Instructor Introduction
      • Course Introduction
      • Section 01 Introduction
      • What is Security Awareness?
      • Security Domains
      • What is Security?
      • Are You at Risk?
      • So What About You?
      • What are the Goals of this Course?
      • What Will We Cover?
      • Surprise!
      • Is it Too Late?
      • Review
      • Course Overview
      • Section 01 Workbook
    • Types of Security Threats
      • Section 02 Introduction
      • Your Computer
      • Your Internet
      • Yourself
      • Your Words
      • Your E-mail
      • Your Home
      • Your Files
      • Review
      • Types of Security Threats
      • Section 02 Workbook
    • Social Engineering
      • Section 03 Introduction
      • What is Social Engineering?
      • Social Engineering Defense
      • Manipulation
      • Why Does it Work?
      • Fooling People
      • What Else Can Be Done?
      • Personal Precautions
      • Review
      • Social Engineering
      • Section 03 Workbook
    • Identity Theft
      • Section 04 Introduction
      • What is Identity Theft? (Part 1)
      • What is Identity Theft? (Part 2)
      • How Does it Happen? (Part 1)
      • How Does it Happen? (Part 2)
      • How to Defend Yourself (Part 1)
      • How to Defend Yourself (Part 2)
      • How to Defend Yourself (Part 3)
      • How to Defend Yourself (Part 4)
      • What Criminals Do with Your Information (Part 1)
      • What Criminals Do with Your Information (Part 2)
      • What Criminals Do with Your Information (Part 3)
      • How Can You Tell if You’re a Victim?
      • Actions to Take if You are a Victim (Part 1)
      • Actions to Take if You are a Victim (Part 2)
      • Contact Information
      • Review
      • Identity Theft
      • Section 04 Workbook
    • Data Classification
      • Section 05 Introduction
      • Policies for Data Sharing
      • Least Privilege
      • How to Classify (Part 1)
      • How to Classify (Part 2)
      • How to Classify (Part 3)
      • How to Classify (Part 4)
      • How to Classify (Part 5)
      • How to Classify (Part 6)
      • How to Classify (Part 7)
      • Types of Classifications
      • Jurisdictional Issues
      • Your Involvement
      • What Could Happen?
      • What Type of Policies?
      • How to Destroy Data (Part 1)
      • How to Destroy Data (Part 2)
      • Review
      • Data Classification
      • Section 05 Workbook
    • Protecting Your Digital Information
      • Section 06 Introduction
      • Why Do a Backup?
      • Types of Backups (Part 1)
      • Types of Backups (Part 2)
      • What to Backup (Part 1)
      • What to Backup (Part 2)
      • Where to Store Backups (Part 1)
      • Where to Store Backups (Part 2)
      • How to Perform Backups
      • Demo - Backups
      • Backup Utilities (Part 1)
      • Backup Utilities (Part 2)
      • Backup Management Practices
      • Passwords
      • Demo - Password Management
      • Password Management (Part 1)
      • Password Management (Part 2)
      • Password Management (Part 3)
      • Password Management (Part 4)
      • AAA
      • Review
      • Protecting Your Digital Information
      • Section 06 Workbook
    • Malware
      • Section 07 Introduction
      • Basic Definitions
      • What to Look For
      • How You Can Get Infected (Part 1)
      • How You Can Get Infected (Part 2)
      • Software Detection
      • Hardware Detection
      • Cloud Detection
      • Know the Extensions
      • Demo - Knowing Your Extensions
      • Your Defenses
      • Review
      • Malware
      • Section 07 Workbook
    • Security from End-to-End
      • Section 08 Introduction
      • Physical Security (Part 1)
      • Physical Security (Part 2)
      • Home/Workstation Security (Part 1)
      • Home/Workstation Security (Part 2)
      • Encryption
      • Demo - EFS
      • Hand Held Electronics
      • Workstation Software
      • Updating the OS and Software
      • Secure E-mail Use (Part 1)
      • Secure E-mail Use (Part 2)
      • E-mail Encryption (Part 1)
      • E-mail Encryption (Part 2)
      • E-mail Hazards
      • How to Stop SPAM
      • E-mail Attachments
      • Other E-mail Warnings
      • What if You Get Malware from E-mail?
      • How to Avoid SPAM
      • Secure Web Browsing (Part 1)
      • Secure Web Browsing (Part 2)
      • Secure Web Browsing (Part 3)
      • Secure Web Browsing (Part 4)
      • Demo - Secure Web Browsing
      • Secure Instant Messaging / Social Sites
      • Review
      • Security from End-to-End
      • Section 08 Workbook
    • Piracy
      • Section 09 Introduction
      • What is Intellectual Property
      • Copyrights
      • Software Piracy (Part 1)
      • Software Piracy (Part 2)
      • Types of Piracy (Part 1)
      • Types of Piracy (Part 2)
      • Risks (Part 1)
      • Risks (Part 2)
      • Review
      • Piracy
      • Section 09 Workbook
    • Security Policies
      • Section 10 Introduction
      • Security Policies (Part 1)
      • Security Policies (Part 2)
      • Security Policies (Part 3)
      • Why are Policies Important
      • Defining an Incident
      • Response Teams (Part 1)
      • Response Teams (Part 2)
      • Response Checklist (Part 1)
      • Response Checklist (Part 2)
      • Review
      • Security Policies
      • Section 10 Workbook
    • Moving Forward
      • Section 11 Introduction
      • Education and Awareness (Part 1)
      • Education and Awareness (Part 2)
      • Individuals
      • Organizations
      • Know the Principles of Security Domains
      • Review
      • Moving Forward
      • Course Closure
      • Section 11 Workbook


Course Fee:
USD 49

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top